bowbridge SAP Cybersecurity Blog
bowbridge-banner-1

bowbridge SAP Cybersecurity Blog

cyber-attack-preparation

Aug 19, '20 by Joerg Schneider-Simon

Why do so many organizations use SAP software? Because it gives them powerful access to their data and mission-critical processes.

Unfortunately, that’s also why SAP is such a choice target for cyberattack.

If your organization uses SAP software for...

cyber-challenges-dominos

Aug 13, '20 by Joerg Schneider-Simon

In 2013, cybersecurity challenges ranked in seventh place among the most important issues facing IT management.

Today, cybersecurity ranks as the first or second most important challenge facing IT leaders.

It’s no wonder. High-profile data breaches...

govt-cybersecurity2

May 20, '20 by Joerg Schneider-Simon

In June 2019, Bitcoin hackers penetrated the computer systems of the city government of Riviera Beach, Florida, installing ransomware that cost the city roughly $600,000 to remediate by paying a ransom. In that same year, the government offices of...

cross-site-scripting-attacks

May 13, '20 by Joerg Schneider-Simon

If your web-based SAP application gets attacked today, the attack vector will likely be a cross-site scripting (XSS) attack.

Cross-site scripting attacks remain the most common form of web attack against SAP applications, and the pace of attacks is...

remote-workforce-threats

May 6, '20 by Joerg Schneider-Simon

Infected. Unprepared. Unprecedented.

These are the words that experts are using when discussing the coronavirus—but while medical experts use those terms in reference to human health, cybersecurity experts are having similar discussions about SAP...

SAP-in-the-cloud

Apr 22, '20 by Joerg Schneider-Simon

Migrating your SAP systems to the cloud offers many operational and financial benefits. SAP migration to the cloud reduces your hardware costs, makes backup and disaster recovery more robust, and improves availability, reliability and scalability.

A...

MIME-types

Apr 14, '20 by Joerg Schneider-Simon

Editor's Note: We recently updated this previously published post with new insights. Enjoy!

Want to protect your SAP applications against file-based attacks? Use MIME-Type checks.

One way that cyber attackers attempt to compromise SAP systems is by...

SAP-vulnerabilities-2020

Mar 3, '20 by Joerg Schneider-Simon

While SAP helps businesses operate more efficiently through streamlined business processes, its complexity means it presents a significant attack surface for hackers.

Since businesses use SAP for managing their most sensitive business processes, it...

SAP-security-notes-2020

Feb 12, '20 by Joerg Schneider-Simon

We’ve said it before: Keeping SAP security patches up to date is one of the most effective ways to prevent a successful cyberattack.

To make that task a bit easier, here is our quick summary of the Security Notes Update that SAP issued in January...